Share Article

IP Cores, Inc. (http://www.ipcores.com) announces shipment of an FPGA version of the statistics companion IP core for its popular 100 Gbps MACsec (IEEE 802.1AE) encryption/decryption core.

Palo Alto, California (PRWEB)May 20, 2014

IP Cores, Inc., California, USA (http://www.ipcores.com) has announced shipments of an FPGA version of the MACsec statistics add-on core for its popular MSP10 MACsec encryption/decryption core for line-speed MACsec processing targeting the 100 Gbps Ethernet solutions.

“An FPGA version of a companion to our successful MSP10 MACsec core helps our customers using FPGAs to implement secure 100G communication solutions,” said Dmitri Varsanofiev, CTO of IP Cores, Inc. “The statistics core gluelessly interfaces to our MSP10 core and is fully integrated to provide our customers with an instant addition of the statistics counters to their design per the IEEE 802.1AE standard.”

MSP10 100 Gbps Ethernet Encryption Core

MSP10 MACsec IP core delivers full 100 Gbps data rate on any frame mix, including the shortest 64-byte Ethernet frames. Variety of the core configurations permits up to tens of thousands of simultaneously active secure associations. All features of the MACsec standard are supported, including the recent extensions: IEEE 802.1AEbw (XPN, 64-bit extended packet numbering) and IEEE 801.1AEbn (GCM-AES-256 encryption).

MSP10 core has been made available for all modern FPGA families, including those manufactured by Altera and Xilinx, in addition to the original ASIC targeting.

MACsec is the IEEE MAC Security standard (also known as 802.1AE) that defines connectionless data confidentiality and integrity for media access protocols. It is standardized by the IEEE 802.1 working group. MACsec specifies the implementation of a MAC Security Entities (SecY) and defines MACsec frame format, which is similar to the Ethernet frame, but includes additional fields (Security Tag and Message authentication code or ICV).

Security tag inside each frame in addition to Ethertype includes the secure channel identifier, association number within the channel, and packet number in order to provide unique initialization vector for encryption and authentication algorithms as well as the protection against replay attacks.